ISSC458 Week 1 Assignment Name: Noel Pfabe Date: 4 October 2023 Fill in your name above, put your full response below each question, save the file using the file naming convention: " ISSC458_Week1_Assignment_LastName_FirstName.doc " where LastName is your last name and FirstName is your first name, then return this document for grading. Instructions: Steganography is a technique often used to conceal sensitive information within an image. Steganography can also be used to protect sensitive information instead of concealing. 1. Find a peer-reviewed article about using steganography to protect data and write a two page report about the ideas expressed in the article. Use three additional resources to support your opinions. 2. Post the assignment to the Assignment area. 3. Post the article you found to the Week 1 area under Stego articles. Assignment Rubric ( 100 Points) Synthesis of Concepts 60 Writing Standards - APA format 20 Timeliness 20 Over the past several years, the use of biometric systems have grown in popularity. iPhone and Andrioid users everday use either their face or fingerprint to unlock their phones. Biometric procedures are also gaining popularity in banking, government agencies, retail sales, law enforcment, health services, and border control. One of the main reasons why biometric data has become so popular is because of its ability to distinguish between an authorized user and a deceptive one. As it continues to expand the matter of security and confidenitality comes into question. How do you safeguard biometric data? Can a deceptive user open a device up or gain access by getting latent print? Information hiding techniques are a vital way to protect and add
ISSC458 Week 1 Assignment security to biometric systems. A great example is steganography which is the process of hiding critical data (Douglas, Bailey, Leeney, and Curran 2018). Steganography is a means of storing information in a way that hides that information's existence (Artz 2001). This is done because steganography is able to encrypt the data with secret keys befrore embedding the data into an image or file. For biometric systems steganography can be applied using the reversible and irreverisble approach. A reversible data hiding technique, allows for a full recovery of the orginal carreir file even after extraction of the hidden data. Irreverisble technique may leav the original carrier file distorted after the hidden data is extracted. In order for steganographic algorithm to be successful it must adhere to certain requirements. Those requirements are invisibilty, payload capacity, robustness agaisnt statistical attacks, robustness agaisnt image manipulation, independent of file format, and unsucpicious files. This is to ensure that any hidden data stays invisible to the human eye (Douglas, Bailey, Leeney, and Curran 2018). When using stegangoprahpy to hide data, it is important to undestand its limitations. Essentailly, it is constrained by the same assumption that exists for encryption. Additionally, the amount of data that can be effecively hidden in a given medium tends to be restricted by the size of the medium itself. When the medium has fewer constraints on the intergrity, the more potential the medium has for hiding data. It is also important to understand the purpose of steganography is not to keep others from knowing the hidden information, but it is to keep others from thinking that the infroamtion even exists. Lastly, when choosing images to hide infromation in, it is
ISSC458 Week 1 Assignment improtant to not choose images that already has a questionable value already. A great example of this is an image of televison static (Artz 2001).
Uploaded by EarlFreedom6930 on